David Wheeler

According to our database1, David Wheeler authored at least 18 papers between 1996 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Trusted Execution Environment Provisioning (TEEP) Architecture.
RFC, July, 2023

2022
Experiences in network and data transfer across large virtual organizations - a retrospective.
Proceedings of the PEARC '22: Practice and Experience in Advanced Research Computing, Boston, MA, USA, July 10, 2022

2021
The Petascale DTN Project: High Performance Data Transfer for HPC Facilities.
CoRR, 2021

2020
The MAGIC Mode for Simultaneously Supporting Encryption, Message Authentication and Error Correction.
IACR Cryptol. ePrint Arch., 2020

2018
Transferring a petabyte in a day.
Future Gener. Comput. Syst., 2018

Rapid MODIS-based detection of tree cover loss.
Int. J. Appl. Earth Obs. Geoinformation, 2018

2017
BOSS-LDG: A Novel Computational Framework That Brings Together Blue Waters, Open Science Grid, Shifter and the LIGO Data Grid to Accelerate Gravitational Wave Discovery.
Proceedings of the 13th IEEE International Conference on e-Science, 2017

2016
Hardware security risk assessment: A case study.
Proceedings of the 2016 IEEE International Symposium on Hardware Oriented Security and Trust, 2016

2014
Alerts of forest disturbance from MODIS imagery.
Int. J. Appl. Earth Obs. Geoinformation, 2014

2011
Normalization and centering of array-based heterologous genome hybridization between species of unknown or unequal divergence.
BMC Bioinform., 2011

2005
Multicollinearity and correlation among local regression coefficients in geographically weighted regression.
J. Geogr. Syst., 2005

2004
Last Orders.
Proceedings of the Security Protocols, 2004

2003
Secure Sessions from Weak Secrets.
Proceedings of the Security Protocols, 2003

2002
An 852×600 pixel OLED-on-silicon color microdisplay using CMOS subthreshold-voltage-scaling current drivers.
IEEE J. Solid State Circuits, 2002

2001
Protocols Using Keys from Faulty Data (Transcript of Discussion).
Proceedings of the Security Protocols, 2001

Protocols Using Keys from Faulty Data.
Proceedings of the Security Protocols, 2001

Merkle Puzzles Revisited - Finding Matching Elements Between Lists.
Proceedings of the Security Protocols, 2001

1996
Transactions Using Bets.
Proceedings of the Security Protocols, 1996


  Loading...